Designed to reduce avoidable risk from surveillance, device seizure, data exposure, doxxing, and opportunistic violence, without advising wrongdoing or evasion of lawful processes.
This is not legal advice.
Public protest has always carried risk. What has changed in recent years is the density and permanence of that risk. Surveillance is no longer exceptional or episodic; it is ambient. Data collection is not limited to state actors; it is embedded in consumer devices, platforms, cameras, and data markets that operate continuously before, during, and long after a protest ends. At the same time, enforcement environments have become less predictable, accountability less certain, and post-event retaliation, through doxxing, employment pressure, or targeted harassment are more common. For many participants, the most serious consequences now occur after they have gone home.
This document is written for that reality.
It does not assume criminal intent, nor does it advocate evasion of lawful authority. It assumes lawful, peaceful protest conducted in an environment where risk is unevenly distributed, rules may be applied selectively, and mistakes compound quickly across technical, physical, and personal domains. In such conditions, safety is not achieved through any single tactic or tool. It is achieved through discipline, preparation, and an understanding that phones, bodies, identities, and communities are all part of the same security system.
The playbook that follows treats technical security, physical safety, operational behavior, and personal exposure as inseparable. A compromised phone can lead to compromised relationships. A moment of physical isolation can create lasting digital consequences. An impulsive post can undo hours of careful on-the-ground decision-making. Conversely, small, well-chosen precautions, clear threat modeling, device hardening, role clarity, exit planning, can dramatically reduce harm without diminishing the expressive or democratic purpose of protest.
This document is intentionally conservative. It favors risk reduction over bravado, exit options over endurance, and community protection over individual visibility. It is designed to be useful to first-time protesters and experienced organizers alike, adaptable across roles, and readable without technical specialization. Where possible, it consolidates guidance from established civil-liberties, digital-rights, and safety organizations into a single, coherent framework.
Above all, this playbook starts from a simple premise: the goal of protest is not merely to show up, but to return safely, with your autonomy, relationships, and future intact. Everything that follows is in service of that outcome.
Before you optimize tactics, define what you are protecting and from whom.
Assets at risk:
Your identity, your contacts, your location history, message content and metadata, photos and video (yours and others’), and your online accounts.
Likely threats at protests:
Device loss or theft, device confiscation, account compromise, location tracking via routine phone telemetry, large-scale video capture, social media OSINT, and post-event doxxing campaigns. These threat categories; loss, confiscation, disruption, and targeted surveillance, are explicitly identified by Amnesty International.
Constraints:
Local laws and policies (mask restrictions, curfews, dispersal orders), your role (organizer, medic, marshal, journalist, attendee), and your risk tolerance.
This threat model determines whether you should bring a smartphone at all. Multiple civil-liberties organizations recommend considering leaving it at home if feasible.
Much has been said about obtaining a “Burn Phone” if you plan on protesting. While this might be a prudent measure, there are a few things you must do in order to insure the security you are attempting to create by getting one.
(Encryption, passcodes, biometrics guidance: ACLU of DC)
(Radio and signal-reduction guidance consolidated from ACLU of DC and World Justice Project toolkits)
(Backup and update guidance consolidated from protest safety toolkits)
Prefer end-to-end encrypted messaging for coordination.
Signal is widely recommended in protest safety guides as an additional layer of protection.
Group hygiene to prevent cascade compromise
Non-digital fallback
(Encrypted comms and fallback planning consolidated from Amnesty and allied civil-liberties guidance)
Many harms occur after protests through doxxing, employer pressure, stalking, and targeted harassment.
(Rights guidance consolidated under ACLU national resources)
This section addresses bodily safety and crowd dynamics, not confrontation or escalation.
(Device seizure guidance consolidated under ACLU DC and EFF resources)
Scope: Lawful, non-violent protest activity
Purpose: Reference directory of vetted, publicly available guidance covering digital security (TECHSEC), personal and organizational security (OPSEC/PERSEC), physical safety, surveillance awareness, and legal rights.
American Friends Service Committee
Use case: Consult before attending a protest to prepare your phone, reduce stored data, and understand digital risks across the full protest lifecycle.
Digital Security Guidelines for Protests | American Friends Service Committee
Electronic Frontier Foundation
Use case: Reference when you need deeper technical explanations of encryption, secure messaging, metadata, and surveillance threats beyond protest-specific summaries.
Digital Safety Practices for Protesters (PDF)
ReconcilingWorks
Use case: Use as a printable or offline guide for step-by-step phone and communication safety before, during, and after protest activity.
ActivistChecklist.org
Use case: Use as a quick pre-protest and post-protest checklist when time or attention is limited.
Prepare for a Protest | Digital Security Checklists for Activists
ACLU of the District of Columbia
Use case: Consult when preparing for protests in heavily policed or camera-dense environments where device seizure or surveillance is a concern.
How to Defend Against Police Surveillance at Protests – ACLU of DC
Surveillance Technology Oversight Project
Use case: Read to understand what surveillance technologies may be deployed against protesters and how collection often extends beyond the event itself.
Protest Surveillance — S.T.O.P.
American Civil Liberties Union
Use case: Reference before attending a protest to understand your constitutional rights, police powers, and how to respond during encounters.
Protesters’ Rights | American Civil Liberties Union
The Leadership Conference on Civil and Human Rights
Use case: Use as a consolidated legal and physical safety reference when planning or supporting larger demonstrations involving many participants.
Human Rights Campaign
Use case: Consult for general preparedness, wellbeing, and situational awareness guidance, especially for first-time protesters.
Tips for Preparedness, Peaceful Protesting, and Safety
Lenfest Institute for Journalism
Use case: Use when documenting protests to balance safety, ethics, legal exposure, and protection of subjects.
WIRED
Use case: Read for a high-level overview of physical preparation and situational safety when you need accessible, non-technical guidance.
Protesting Tips: What to Bring, How to Act, How to Stay Safe | WIRED
International Center for Not-for-Profit Law
Use case: Consult when assessing legal risk by state or tracking changes in protest-related laws over time.